accessibility-audit
Pass
Audited by Gen Agent Trust Hub on Apr 27, 2026
Risk Level: SAFECOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
git diffto identify files modified in the current branch to enable scoped auditing of pull requests. - [REMOTE_CODE_EXECUTION]: The documentation includes instructions for running well-known accessibility auditing tools (
axe,pa11y,lighthouse) vianpxwithin the local development environment (ddev). These are standard tools from trusted registries. - [PROMPT_INJECTION]: The skill analyzes project source code, which introduces a surface for indirect prompt injection. This is inherent to the auditing function.
- Ingestion points: Reads project files (HTML, PHP, Twig, template files) using
ReadandGlobtools. - Boundary markers: None explicitly defined for file content ingestion.
- Capability inventory: Spawns specialized agents via
Task()and executes shell commands for file discovery. - Sanitization: No specific sanitization or filtering of file content is described prior to analysis.
Audit Metadata